Posted by: Greg Ness | July 26, 2017

The Big Shift to Software-Defined IT is Now Underway

A week ago I wrote about the recent AWS VMware partnership and how it threatens traditional IT vendors, practices and roles. The week before I talked about exploding security processes eroding protection at a Fortune 100 leader, based on a recent interview with a security architect.

In May I said the cloud will crush the hardware-bound security (and infrastructure players) as traditional IT shifts into more software and service-centric roles.

The emerging pattern is easily apparent: increasing demands upon larger enterprise networks are forcing IT, security and networking teams from hardware to more agile, software and service-centric operating models and solutions.

AWS and VMware Partnership= the Beginning of the End of Traditional IT

The AWS and VMware partnership is particularly notable because cooperation betweenSpeedometer these two former rivals signals a big shift in AWS strategy from cloud native to hybrid cloud and makes cloud migration a strategic enterprise requirement.

This alliance will force hardware-centric IT vendors, channels and buyers (including third party data center operators) into a deep, profound transformation from ongoing LAN-based maintenance and updates into faster, more powerful, scalable and flexible software and service-enabled solutions.

When you combine this transformation with the rising tide of cyber attacks rippling through increasingly connected networks you can understand increasing enterprise interest in software-defined perimeter technology, an advanced architecture with notable advantages over traditional access control technologies. Software-defined IT will leverage software-defined networking and perimeter technologies. (Note: you can read more about software-defined perimeters in Gartner’s just released Hype Cycle for Cloud Security, 2017 and at Vidder’s software-defined perimeter resource page.)

For example: as one organization struggles with updating dozens (if not hundreds) of distributed hardware appliances the other has software-defined perimeter integrated with trust assessment technology, which is quickly updated across internal and external networks by a service provider then tested by agile security and networking teams.

Verizon’s new Convergent Response offering demonstrated in June is noteworthy because it represents this new thinking, which could enhance Verizon’s leadership in managed security service offerings.

Looking forward you can expect to see the shift start in organizations with high security, compliance and operating demands as they will be among the biggest benefactors. Organizations now under siege with attacks and exploding security processes can shift from reaction fatigue to strategic advantage.

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories

%d bloggers like this: